This article contains information on configuring URL Protect in Mimecast, including inbound, outbound, and journal settings, URL rewrite modes, advanced similarity checks, and actions for handling unsafe URLs in messages and attachments.
Re-written URLs will have a different destination domain depending on the grid/region your account is hosted in.
In case you have systems implemented that need to be aware of such URLs (i.e., parsing of information, Firewalls, Proxies, etc.), please see Data Centers & URLs, and navigate to the Targeted Threat Protection (TTP) section for your region.
To configure a URL Protect definition:
- Log in to the Mimecast Administration Console.
- Navigate to the Gateway | Policies | URL Protection menu item.
- Click on the Definitions button.
- Any existing definitions are listed.
- Click on either of the following:
-
- New Definition button to create a new definition
- Definition to be changed.
- Enter a definition description in the Definition Narrative field. This is kept in the archive if the definition is applied.
- Complete the following sections:
- Click on the Save and Exit button.
We do not rewrite the following domains:
- login.mimecast.com
- login-uk.mimecast.com
- login-de.mimecast.com
- login-au.mimecast.com
- login-us.mimecast.com
- login-usb.mimecast.com
- login-za.mimecast.com
- login-ca.mimecast.com
Inbound Settings
Field / Option | Description | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Enable Inbound Check | If selected, the fields below are displayed. When setting up inbound checks, use a policy with the correct routing to activate this definition. | |||||||||||||||||||||||||||||||||||||||||||||
Rewrite Mode | Select one of the following URL rewrite modes:
|
|||||||||||||||||||||||||||||||||||||||||||||
URL Category Scanning | Specify how aggressively the URL categorization engine operates on dangerous URL categories. Other detection capabilities are not altered when changing this setting. The categories blocked by each set are:
|
|||||||||||||||||||||||||||||||||||||||||||||
QR Code Image Action | Specify the action taken when a QR Code that contains a URL is scanned and classified as Malicious. This can be either of the following options:
|
|||||||||||||||||||||||||||||||||||||||||||||
Action | Specify the action taken when an unsafe URL is detected in a message or attachment. All clicks are logged.
|
|||||||||||||||||||||||||||||||||||||||||||||
Disable Browser Isolation |
Allows you to turn off the browser isolation functionality. See Browser Isolation Overview. This field is only displayed if the "Action" field is set to "Block." |
|||||||||||||||||||||||||||||||||||||||||||||
Message Subject Protection | Microsoft Outlook for Windows automatically converts URLs in the message's subject to hyperlinks. This option specifies how they are handled:
Rewritten links can be up to 200 characters long. Choosing "Rewrite URLs" will visibly alter the format of the message subject. |
|||||||||||||||||||||||||||||||||||||||||||||
Create Missing HTML Body | Specifies whether inbound plain text emails are reformatted as HTML. Doing so allows URLs to be rewritten. | |||||||||||||||||||||||||||||||||||||||||||||
Force Secure Connection | All links protected by Targeted Threat Protection - URL Protection are rewritten as HTTPS by default. If enabled, this option rewrites all links as HTTPS. If disabled, all links are rewritten as HTTP. A confirmation displays if this option is disabled. | |||||||||||||||||||||||||||||||||||||||||||||
Set to Default | Specifies this as the default definition. Any previously rewritten links that do not have a valid policy will use this definition. This option can only be set on one definition. | |||||||||||||||||||||||||||||||||||||||||||||
Ignore Signed Messages | If enabled, URL Protection is not applied to digitally signed messages. This ensures the message's signature remains intact but means the URLs are not rewritten. | |||||||||||||||||||||||||||||||||||||||||||||
Display URL Destination Domain | If enabled, the URL's destination domain is displayed at the end of the rewritten link. For example: protect-eu.mimecast.com/s/1dBvZWHZ?url.uk.m.mimecastprotect.com |
|||||||||||||||||||||||||||||||||||||||||||||
Strip External Source Mode |
If set to "Aggressive," all external components are removed from the message body. This includes CSS, SVG files, font types, and HTML tags (e.g., <embed>, <iframe>, <frame>, <object>, <form>). This may impact the formatting and readability of messages. |
|||||||||||||||||||||||||||||||||||||||||||||
File Protocol URL Handling | This can protect against hash-jacking attempts by checking for URLs that use the "file://" protocol. The options are:
No notification is issued even if the "Enable Notifications" option is selected. This can be mitigated by ensuring your Firewall is configured correctly (e.g., blocking SMB traffic).
The URL Category Scanning option must be set to 'Aggressive' for the File Protocol URL Handling setting to take effect. If the URL Category Scanning option is set to 'Moderate' or 'Relaxed,' the File Protocol URL Handling option is consequently set to 'Off' and will not be applied. |
|||||||||||||||||||||||||||||||||||||||||||||
Block URLs Containing Dangerous File Extensions | Specifies whether URLs containing file extensions that commonly have malware are blocked. This is a balance between files that have a high-security threat versus files that are commonly used and would create too much additional burden on end-users if considered unsafe. See What is a Dangerous File Type?. |
|||||||||||||||||||||||||||||||||||||||||||||
Rewrite URLs Found in Attachments | If this option is selected, you can choose one or more of the following attachment parts to rewrite:
Each of these looks for file attachments in the message of the same file type and rewrites any URLs found in them. Rewriting URLs found in PDF files is not supported. |
|||||||||||||||||||||||||||||||||||||||||||||
URL File Download Malicious detections are logged under the Monitoring | URL Protection menu item. |
If enabled, a check is made to ascertain if the URL points to a download file of the specific file types listed below. If a URL points to one of these file types and is found to be potentially dangerous, you can set this option to warn or block the file. You can sandbox the file if you have Targeted Threat Protection – Attachment Protect. If User Awareness notifications are enabled, users can download the scanned file via the email notification for 12 hours, after which they'll be retaken through the checking process. |
|||||||||||||||||||||||||||||||||||||||||||||
Scan URLs in Attachments Malicious detections are logged under the Monitoring | URL Protection menu item. |
The supported file types are as follows:
Considerations:
|
|||||||||||||||||||||||||||||||||||||||||||||
Advanced Similarity Checks | If selected URLs are checked for advanced attacks, where links appear similar to your internal and monitored external domains. Select at least one of the additional options below:
|
|||||||||||||||||||||||||||||||||||||||||||||
Enable User Awareness | If enabled, user awareness messages are displayed in the user's browser when links are clicked in a message.
We recommend enabling user awareness in your Account Settings. Allowing user awareness without authentication can result in a security risk. For further details, see the Targeted Threat Protection: Configuring URL Protect User Awareness page. |
|||||||||||||||||||||||||||||||||||||||||||||
Enable Notifications | If enabled, notifications can be sent to specific users should a policy be triggered. You can notify the following:
|
Outbound Settings
Outbound settings are only displayed if Targeted Threat Protection is enabled on your account: Internal Email Protection.
Field / Option | Description | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Enable Outbound Check | If selected, the fields below are displayed. When setting up outbound checks, use a policy with the correct routing to activate this definition. | ||||||||||||||||||||||||||||||||||||||||
URL Mode | Specify the URL check mode:
|
||||||||||||||||||||||||||||||||||||||||
URL Category Scanning | Specify how aggressively the URL categorization engine operates on dangerous URL categories. Other detection capabilities are not altered when changing this setting. The categories blocked by each set are:
|
||||||||||||||||||||||||||||||||||||||||
QR Code Image Action | Specify the action taken when a QR Code that contains a URL is scanned and classified as Malicious. This can either of the following options:
|
||||||||||||||||||||||||||||||||||||||||
Gateway Action | Select the gateway action (or fallback action) to take if a message containing an unsafe URL is detected. A fallback measure is only applied if we cannot check a URL.
These settings only display if you've purchased Internal Email Protection. |
||||||||||||||||||||||||||||||||||||||||
Gateway Fallback Action | |||||||||||||||||||||||||||||||||||||||||
User Mailbox Action | Select the action (or fallback action) to take if a message containing an unsafe URL is detected. A fallback measure is only applied if we cannot check a URL.
|
||||||||||||||||||||||||||||||||||||||||
User Mailbox Fallback Action | |||||||||||||||||||||||||||||||||||||||||
Block URLs Containing Dangerous File Extensions | Specifies whether URLs containing file extensions that commonly have malware are blocked. | ||||||||||||||||||||||||||||||||||||||||
Scan URLs in Attachments Malicious detections are logged under the Monitoring | URL Protection menu item. |
The supported file types are as follows:
Considerations:
|
||||||||||||||||||||||||||||||||||||||||
URL File Download Malicious detections are logged under the Monitoring | URL Protection menu item. |
If enabled, a check is made to ascertain if the URL points to a download file of the specific file types listed below. If a URL points to one of these file types and is found to be potentially dangerous, you can set this option to warn or block the file. You can sandbox the file if you have Targeted Threat Protection – Attachment Protect. If User Awareness notifications are enabled, users can download the scanned file via the email notification for 12 hours, after which they'll be retaken through the checking process. |
||||||||||||||||||||||||||||||||||||||||
Advanced Similarity Checks | If selected URLs are checked for advanced attacks, where links appear similar to your internal and monitored external domains. Select at least one of the additional options below:
|
||||||||||||||||||||||||||||||||||||||||
Enable Notifications | If enabled, notifications can be sent to specific users should a policy be triggered. You can notify the following:
|
Journal Settings
Journal settings are only displayed if Targeted Threat Protection is enabled on your account: Internal Email Protect.
Field / Option | Description | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Enable Journal Check | If selected, the fields below are displayed. When setting up journal checks, use a policy with the correct routing to activate this definition. | ||||||||||||||||||||||||||||||||||||||||
URL Mode | Specify the URL check mode:
|
||||||||||||||||||||||||||||||||||||||||
URL Category Scanning | Specify how aggressively the URL categorization engine operates on dangerous URL categories. Other detection capabilities are not altered when changing this setting. The categories blocked by each set are:
|
||||||||||||||||||||||||||||||||||||||||
User Mailbox Action | Select the action (or fallback action) to take if a message containing an unsafe URL is detected. A fallback measure is only applied if we cannot check a URL.
In non-Exchange environments, automatic remediation is not supported. However, if a support journal connector is used, you can leverage detection and, through these alerts, perform manual remediation.
|
||||||||||||||||||||||||||||||||||||||||
User Mailbox Fallback Action | |||||||||||||||||||||||||||||||||||||||||
Block URLs Containing Dangerous File Extensions | Specifies whether URLs containing file extensions that commonly have malware are blocked. | ||||||||||||||||||||||||||||||||||||||||
Scan URLs in Attachments Malicious detections are logged under the Monitoring | URL Protection menu item. |
The supported file types are as follows:
Considerations:
|
||||||||||||||||||||||||||||||||||||||||
URL File Download Malicious detections are logged under the Monitoring | URL Protection menu item. |
If enabled, a check is made to ascertain if the URL points to a download file of the specific file types listed below. If a URL points to one of these file types and is found to be potentially dangerous, you can set this option to warn or block the file. You can sandbox the file if you have Targeted Threat Protection – Attachment Protect. If User Awareness notifications are enabled, users can download the scanned file via the email notification for 12 hours, after which they'll be retaken through the checking process. |
||||||||||||||||||||||||||||||||||||||||
Advanced Similarity Checks | If selected URLs are checked for advanced attacks, where links appear similar to your internal and monitored external domains. Select at least one of the additional options below:
|
||||||||||||||||||||||||||||||||||||||||
Enable Notifications | If enabled, notifications can be sent to specific users should a policy be triggered. You can notify the following:
|
Comments
Please sign in to leave a comment.